Learn More
This paper presents a method for sharing and hiding secret images. The method is modiÿed from the (t; n) threshold scheme. (Comput.Graph. 26(5)(2002)765) The given secret image is shared and n shadow images are thus generated. Each shadow image is hidden in an ordinary image so as not to attract an attacker's attention. Any t of the n hidden shadows can be(More)
Spoofing attack (or copy attack) is a fatal threat for biometric authentication systems. In this paper, we present a novel liveness detection method based on frequency entropy of image sequences against the photograph spoofing. By splitting the color video of face region into RGB channels, we can obtain the time sequences of each color channel. Then, three(More)
Video-based Heart Rate Measurement has drawn a lot of attention in recent years. A few papers have been proposed in this work and most of them applied Fourier transform peak interval determination method for heart rate measurement. However, the analyzing duration for one outcome in these methods is usually longer than 15 seconds. This is because that the(More)
Video-based face recognition has drawn a lot of attention in recent years. On the other hand, Bag-of-visual Words (BoWs) representation has been successfully applied in image retrieval and object recognition recently. In this paper, a video-based face recognition approach which uses visual words is proposed. In classic visual words, Scale Invariant Feature(More)
This article examines the process, causes and repercussions of the accession of Taiwan, as a contested state, together with China, to the Asia-Pacific Economic Cooperation in 1991, the first intergovernmental organization that Taipei has joined since 1971. Based on an analysis of elite interviews, primary and secondary data, the paper traces the(More)
The customer analysis can be applied widely in many situations, such as surveillance system, digital signage, store entrance, etc. In digital signage application, when customers are viewing ads, the system can automatically analyze multiple attributes of customers, including customer's gender, age, height, viewing distance, the degree of interest and total(More)
The right of the editor to be identifi ed as the author of the editorial meterial, and of the authors for their individual chapters, has been asserted in accordence with sections 77 and 78 of the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic,(More)
  • 1